Hello community,

here is the log from the commit of package rsh for openSUSE:Factory checked in 
at 2012-10-19 08:51:19
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/rsh (Old)
 and      /work/SRC/openSUSE:Factory/.rsh.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "rsh", Maintainer is "nadvor...@suse.com"

Changes:
--------
--- /work/SRC/openSUSE:Factory/rsh/rsh.changes  2011-10-13 12:33:31.000000000 
+0200
+++ /work/SRC/openSUSE:Factory/.rsh.new/rsh.changes     2012-10-19 
08:51:20.000000000 +0200
@@ -1,0 +2,5 @@
+Wed Oct 17 13:58:55 UTC 2012 - vci...@suse.com
+
+- fork before exec to avoid SIGHUP from systemd-logind (bnc#783187)
+
+-------------------------------------------------------------------

New:
----
  netkit-rsh-0.17-fork_before_exec.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ rsh.spec ++++++
--- /var/tmp/diff_new_pack.2GYJZO/_old  2012-10-19 08:51:22.000000000 +0200
+++ /var/tmp/diff_new_pack.2GYJZO/_new  2012-10-19 08:51:22.000000000 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package rsh
 #
-# Copyright (c) 2011 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2012 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -15,19 +15,17 @@
 # Please submit bugfixes or comments via http://bugs.opensuse.org/
 #
 
-# norootforbuild
-
 
 Name:           rsh
-BuildRequires:  ncurses-devel pam-devel
-License:        BSD-3-Clause
-Group:          Productivity/Networking/Other
+BuildRequires:  ncurses-devel
+BuildRequires:  pam-devel
 Requires:       netcfg
 Provides:       nkitb:/usr/bin/rsh
-AutoReqProv:    on
 Version:        0.17
-Release:        707
+Release:        0
 Summary:        Clients for remote access commands (rsh, rlogin, and rcp)
+License:        BSD-3-Clause
+Group:          Productivity/Networking/Other
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 Url:            ftp://ftp.uk.linux.org/pub/linux/Networking/netkit/
 Source:         netkit-rsh-%{version}.tar.bz2
@@ -51,6 +49,7 @@
 Patch13:        netkit-rsh-0.17-glibc28.patch
 Patch14:        netkit-rsh-0.17-tty-4-pam.diff
 Patch15:        netkit-rsh-0.17-pam-sess.patch
+Patch16:        netkit-rsh-0.17-fork_before_exec.patch
 
 %description
 This package contains programs that allow users to run commands on
@@ -63,14 +62,12 @@
 
 
 %package server
-License:        BSD-3-Clause
 Version:        0.17
-Release:        707
+Release:        0
 Summary:        Servers for Remote Access Commands (rsh, rlogin, rcp)
 Group:          Productivity/Networking/Other
 Requires:       netcfg
 Provides:       nkitserv:/usr/sbin/in.rshd
-AutoReqProv:    on
 
 %description server
 This package contains a set of server programs which allow users to run
@@ -100,6 +97,7 @@
 %patch13
 %patch14
 %patch15
+%patch16
 
 %build
 CFLAGS="$RPM_OPT_FLAGS -Wall -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -fPIE" 
\

++++++ netkit-rsh-0.17-fork_before_exec.patch ++++++
Index: rshd/rshd.c
===================================================================
--- rshd/rshd.c.orig    2012-10-17 16:01:13.093594194 +0200
+++ rshd/rshd.c 2012-10-17 16:01:40.036397082 +0200
@@ -482,7 +482,28 @@ doit(struct sockaddr *fromp)
                close(pv[0]);
                dup2(pv[1], 2);
                close(pv[1]);
+       } else {
+               pid = fork();
+               if (pid == -1)  {
+                       error("Can't fork; try again.\n");
+                       exit(1);
+               }
+               if (pid) {
+                       close(0);
+                       close(1);
+                       close(2);
+                       int status;
+                       wait(&status);
+#ifdef USE_PAM
+                       pam_close_session(pamh, 0);
+                       pam_end(pamh, PAM_SUCCESS);
+#endif
+                       exit(0);
+                       /* NOTREACHED */
+               }
+               setpgrp();
        }
+
        theshell = pwd->pw_shell;
        if (!theshell || !*theshell) {
            /* shouldn't we deny access? */
-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to